SOF Day 1 Review

SOF Day 1 Review

Professional Development

12 Qs

quiz-placeholder

Similar activities

Cybersecurity Concepts

Cybersecurity Concepts

Professional Development

10 Qs

Session 4 - Basic OER

Session 4 - Basic OER

Professional Development

10 Qs

Module 2A. Active Reconnaissance - Scanning

Module 2A. Active Reconnaissance - Scanning

Professional Development

15 Qs

Roblox

Roblox

Professional Development

10 Qs

Random stuff

Random stuff

KG - Professional Development

12 Qs

Python

Python

University - Professional Development

10 Qs

SIRI Day 2 Review

SIRI Day 2 Review

Professional Development

11 Qs

Bubble Sort

Bubble Sort

1st Grade - Professional Development

13 Qs

SOF Day 1 Review

SOF Day 1 Review

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Justin Bauguess

Used 24+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are some of the costs associated with a data breach? (Select more than one answer.)

Fines

Re-Training Employees

Reputation Damage

Nothing - Data Breaches don't cost anything

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are some signs a security operations organization is at ServiceNow's "Maturity Level 2"? (Multiple answers)

Automated querying of internal and supplier environments

Prioritization by impact

KPIs, Reporting, and SLAs

Noise Reduction

Easily handle common attacks to improve response closure

Answer explanation

Automated querying of internal and supplier environments is part of level 5 Easily handle common attacks to improve response closure is part of level 4.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: It is better to add roles directly to a user rather than adding roles to a group and then users to the group.

True

False

Answer explanation

Adding roles to the group then users to that group prevents a user from keeping a role they should not have.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the scope prefix for Security Incident?

sn_sec_si

sn_sec_cmn

sn_vul

sn_si

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the scope prefix for Vulnerability Response?

sn_sec_vul

sn_vul

sn_si

sn_sec_cmn

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which are features from Security Support Common (but can be used for other purposes)?

There are multiple answers.

Enrichment Data Mapping

Email Parsing

Escalations

Workflow Triggers

Filter Groups

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False. Vulnerable Items can only be part of one Remediation Task (Vulnerability Group).

True

False

Answer explanation

Vulnerable Items and Remediation Tasks (Vulnerability Groups) are related in the sn_vul_m2m_vul_group_item table.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?